PK Chan, MV Mahoney… - Managing Cyber Threats …, 2005 - books.google.com
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …